Slowdroid: Turning a smartphone into a mobile attack vector

E Cambiaso, G Papaleo, M Aiello - … International Conference on …, 2014 - ieeexplore.ieee.org
… We present a mobile threat, SlowDroid, running on Android operating … We present in detail
SlowDroid implementation and our … We report as a test case the SlowDroid attack [5] we have …

Implementation of SlowDroid: Slow DoS Attack Performed by a Smartphone

E Cambiaso, G Papaleo, M Aiello - International Journal of …, 2015 - journal.uob.edu.bh
… We exhaustively present SlowDroid implementation and choices in terms of design, user …
more attacking bandwidth than SlowDroid. Therefore, the SlowDroid attack introduced in this …

Perpetrate network attacks from mobile devices

G Papaleo, E Cambiaso, P Farina… - … on Ubiquitous and …, 2015 - ieeexplore.ieee.org
… In particular, we introduce the SlowDroid attack involving Android based devices. … of a
SlowDroid attack working over the Tor network and its possible execution from mobile devices. …

Mobile executions of slow DoS attacks

E Cambiaso, G Papaleo, G Chiola… - Logic Journal of …, 2016 - academic.oup.com
… The SlowDroid attack presented in this article should be considered as a substantial …
and network) resources needed, the SlowDroid attack presented in this article should be …

The Trade-Off Between the False-Positive Ratio and the Attack Cost of Slow HTTP DoS

T Hirakawa, T Takata - … in Networked-Based Information Systems: The …, 2021 - Springer
… “SlowDroid” aimed at reducing the amount of traffic to perform DoS attacks from mobile
devices. They compared Slowloris, Slow Read and SlowDroid … found that SlowDroid is effective …

A network traffic representation model for detecting application layer attacks

E Cambiaso, G Papaleo, G Chiola… - International Journal of …, 2016 - 137.117.138.59
… Analyzing results for the attacks it is clear that both Slowloris and SlowDroid may be …
Nevertheless, by adopting the threshold, both Slowloris and SlowDroid are detected from the system …

[HTML][HTML] A survey of low rate ddos detection techniques based on machine learning in software-defined networks

AA Alashhab, MSM Zahid, MA Azim, MY Daha… - Symmetry, 2022 - mdpi.com
… Attackers may also use tools such as SlowDroid [13] to launch low-rate attacks on
smartphones with limited processing power and exploit weaknesses in the application layer using …

Resource and timing aspects of security protocols

A Aires Urquiza, MA Alturki… - Journal of computer …, 2021 - content.iospress.com
Protocol security verification is one of the best success stories of formal methods. However,
some aspects important to protocol security, such as time and resources, are not covered by …

A review of defense against slow HTTP attack

S Suroto - JOIV: International Journal on Informatics Visualization, 2017 - joiv.org
… Reference [16] designed an attack tool, named SlowDroid. A tool runs on an Android
mobile device. The research compares attacks with similar tools that already exist. …

Low-rate DDoS attack detection based on factorization machine in software defined network

W Zhijun, X Qing, W Jingjie, Y Meng, L Liang - IEEE Access, 2020 - ieeexplore.ieee.org
… Attackers can also use SlowDroid [25] to initiate low-rate attacks on devices that are not
very powerful, and exploit vulnerabilities on the application layer protocol to evade existing …